Abstract
Early first and second generation (1G and 2G, respectively) wireless telecommunication networks were isolated in the sense that their signaling and control infrastructure was not directly accessible to end subscribers. The vision of the next generation 3G wireless telecommunication network is to use IP technologies for control and transport. The introduction of IP technologies has opened up a new generation of IP-based services that must interwork with traditional 3G wireless telecommunication networks. Cross Network Services will use a combination of Internet-based data and data from the wireless telecommunication network to provide services to the wireless subscriber. They will be multi-vendor, multi-domain, and will cater to a wide variety of needs. An example of such a Cross Network Service is the Email Based Call Forwarding Service (CFS), where the status of the subscriber’s email inbox is used to trigger call forwarding in the wireless telecommunication network.
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kotapati, K., Liu, P., Sun, Y., LaPorta, T.F. (2005). A Taxonomy of Cyber Attacks on 3G Networks. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_82
Download citation
DOI: https://doi.org/10.1007/11427995_82
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)